Provably secure authenticated key exchange protocols for low power computing clients

Hsiang An Wen, Chun Li Lin, Tzonelih Hwang

Research output: Contribution to journalArticle

26 Citations (Scopus)

Abstract

Low power computing devices such as cellular phones, PDAs, and smart cards are very popular and widely used by people nowadays. To secure communications between a client and a server through a low power computing device, several AKE-LPC (Authenticated Key Exchange - for Low Power Computing clients) protocols have been proposed recently. This paper proposes a new efficient AKE-LPC protocol, which requires the client to perform only one hash operation during the execution phase. An augmented protocol which can additionally provide explicit mutual authentication is also presented. Furthermore, the security of the proposed protocols is formally proven in the random oracle model.

Original languageEnglish
Pages (from-to)106-113
Number of pages8
JournalComputers and Security
Volume25
Issue number2
DOIs
Publication statusPublished - 2006 Mar

All Science Journal Classification (ASJC) codes

  • Computer Science(all)
  • Law

Fingerprint Dive into the research topics of 'Provably secure authenticated key exchange protocols for low power computing clients'. Together they form a unique fingerprint.

Cite this